摘要:
A solution (300) for metering usage of software products on a data processing system is proposed. In this context, it is often necessary to known a processing power of each computer wherein a generic software product ran (for example, for licensing accounting based on differentiated charging rates). In the proposed solution, the processing power is estimated dynamically on the computer directly. For this purpose, a (single-threaded) benchmark program written in a low-level language is executed (308-322), such as at the startup or periodically. In this way, dividing (324) the measured execution time of the benchmark program by the known number of its instructions it is possible to determine an execution rate of a single microprocessor of the computer. This value multiplied (326) by the detected (306; 332) number of available microprocessors provides an accurate estimate of the processing power of the computer. The desired result is achieved without requiring any knowledge of the physical details of the computer; this is particularly advantageous when the computer consists of a logical guest machine implemented on a physical host machine.
摘要:
A scheduler is provided, which takes into account the location of the data to be accessed by a set of jobs. Once all the dependencies and the scheduling constraints of the plan are respected, the scheduler optimizes the order of the remaining jobs to be run, also considering the location of the data to be accessed. Several jobs needing an access to a dataset on a specific disk may be grouped together so that the grouped jobs are executed in succession, e.g., to prevent activating and deactivating the storage device several times, thus improving the power consumption and also avoiding input output performances degradation.
摘要:
A solution for managing a software image being stored in a plurality of physical blocks of a storage system comprises monitoring each access to the physical blocks, calculating a predicted sequence of access to the physical blocks according to the monitored accesses, and reorganizing the physical blocks according to the predicted sequence. The monitoring may be performed as the physical blocks are accessed during the booting of virtual images on the software image.
摘要:
Embodiments monitor the participation of remote users to conference calls even when they are connected through simple telephone, i.e. without multimedia (or Internet) connection. In particular, an embodiment enables callers to monitor an up to date list of participants without the need of using a dedicated phone or connecting through a PC and a dedicated line to a central Conference Call system. This can be highly useful in case of travelling users who are expected to join the call from different places. Embodiments may not need a complex network infrastructure or network protocol change, since the information about the participant list can be transmitted over the normal phone line using a predetermined set of signals (e.g. an acoustic signal). Both the Conference Call server and the peripheral devices may refer to the same set of signals. Embodiments may be transparent to those users who do not wish to (or cannot) use the new functionality.
摘要:
A method and system for managing power consumption by electrical appliances, is provided. One implementation involves obtaining power consumption information for a use cycle of a each of multiple appliances; and automatically scheduling a time slot for an operation cycle of a selected appliance as a function of power consumption by appliance cycles scheduled in that time slot, such that an upper limit of power consumption is not exceeded by the collective power consumption for scheduled appliance cycles in the time slot.
摘要:
A mechanism for reducing electronic mail (email) sizes by using a local archive of email components is provided. The mechanism receives the email file, the email file specifying a sender identifier of a sender of the email file, a recipient identifier of a recipient of the email file, and common component information for a common component included in the email file, the common component being a component of the email file that is common amongst a plurality of email files sent from the sender. The mechanism identifies the common component of the email file and determines whether to remove the common component from the email file before forwarding the email file to the recipient based on at least the sender identifier. Based on the determination, the common component is either removed or kept in the email file that is subsequently transmitted to the recipient computer.
摘要:
A method and system for dynamically sharing performance information among multiple computing nodes. One implementation involves dynamically obtaining performance information from deployments of an information technology (IT) product/solution at said computing nodes, and transmitting the obtained performance information to a server over a communication network for storing the obtained performance information in a knowledge database. The server operates to dynamically determine new configuration information based on the information in the database, store the new configuration in the database, and provide the new configuration information to said deployments by transmitting the new configuration information over the network.
摘要:
A solution (400) for scheduling execution of jobs is proposed. The submission of the jobs is generally controlled according to a production plan (406), which specifies a required finish time of critical jobs. In the proposed solution, a current progress of each critical job is monitored (427-430)—such as comparing a (measured) number of processor cycles dedicated to the critical job with an estimated total number thereof (required to complete the critical job, as inferred from previous executions thereof). At the same time, an expected progress of each critical job is estimated (433)—such as by the ratio between a time elapsed from an actual start time of the critical job and an allowable duration thereof (from the actual start time to the required finish time). The current progress of each critical job is then compared with its expected progress, so as to identify (436) the critical jobs that are late in their execution. Additional execution resources can then be assigned to each late critical job only when it is necessary to bring back the critical job on schedule.
摘要:
A method and system of authenticating submissions from a client to a server within a secure session as established for example by entry of username and password data, wherein the session is composed of a number of transactions each of which is itself additionally authenticated, for example by submission of biometric data. Thus each transaction is authenticated both individually and at a session level. In an embodiment the session level authentication may comprise submission of a pin code at am ATM, whilst every subsequent request or instruction from the user could be accompanied by for example fingerprint data from a scanner integrated in the ATM keypad. A session comprises a number of transactions, each of which is individually authenticated. Preferably a session level authentication is carried out at the beginning of a session, from which authority for the following transaction authentications is derived. This may be achieved by comparing transaction authentication information with the authorised session initiating authentication data. Each transaction can be provided with authentication data by recourse to biometric measurements of a user.
摘要:
A method and system for populating a software catalogue in software applications which monitor the presence of software products on a plurality of computers. The proposed method aims at populating a software catalogue with a limited manual intervention of an administrator. The present invention reduces the cost of producing and maintaining a comprehensive knowledge base (the catalogue) which contains definitions of software products and the related signature. Information about software products and their related signature is obtained through a process using some special files (e.g. XML files) which contains information and/or pointers to other products.